We’ve joined forces with Smartlogic to reveal smarter decisions—together.

MarkLogic Security Workshop – Coming to a City Near You

Another day, another security breach.

At least that’s what it feels like lately. The attacks take many different shapes and forms. From the high profile, massive scale breaches of consumer credit data to the theft of mobile phone user data. And no organization is immune. There have even been ransomware attacks on fuzzy talking teddy bears Teddy bears!!

As business leaders and technologists we are challenged each day to make decisions and implement systems that place security as a top priority. Doing so reduces risk and protects our customers and business. But we’re also faced with intense pressure to deliver new applications and data services faster than ever before.

Fortunately, time to market and information security don’t need to be at odds with one another.
Customers choose NoSQL technology because of the agility, flexibility, scalability and speed it provides.

And you have chosen MarkLogic NoSQL because of its enterprise capabilities and proven, certified security model. In this FREE workshop, you will learn hands-on how to use MarkLogic to implement security inside the database. You will also get to hear from industry leaders to gain insight into real-world examples of security concepts in action.


Why You Need to Attend

What you will learn: Why it is important:
How to design and implement role-based access control to secure information in the database. Users should be given access to the least amount of information that is needed in order for them to do their jobs. By implementing roles and permissions you can be restrictive, but also flexible, so that you create a model that is easy to manage over time.
How to control access to data on a granular level Some people need access to certain bits of information but not to other bits. Information within the database can be protected at the XML element or JSON property level. This enables you to restrict user access to certain parts of a document – or to prevent a user from even knowing that those parts exist.
How to implement encryption. External hackers aren’t the only threat. There is also the threat from internal sources. How do you protect against a rogue DBA or system administrator? Encryption enables you to encrypt the data in the database (including logs and configuration files). Key management to the encrypted data enables you to limit the power of an individual, so that even if someone with access to the disk was to steal data and take it offsite, they couldn’t use that data without the keys.

Hurry! Spaces Are Limited — Register Today!

Greg Nist - Director, Training and Community | MarkLogic

Start a discussion

Connect with the community

STACK OVERFLOW

EVENTS

GITHUB COMMUNITY

Most Recent

View All

Facts and What They Mean

In the digital era, data is cheap, interpretations are expensive. An agile semantic data platform combines facts and what they mean to create reusable organizational knowledge.
Read Article

Truth in ESG Labels

Managing a portfolio of investments for your client has never been simple - and doing so through an ESG lens raises the complexity to an almost mind-boggling level. Learn the signs your team has hit the wall with current tools - and how a semantic knowledge graph can help.
Read Article

4 Signs You’ve Got a Transaction Reconciliation Challenge

Many firms manage transaction reconciliation using smart people armed with spreadsheets - but that doesn't scale well. Learn what to look for, to know if you're creating new forms of risk for your firm.
Read Article
This website uses cookies.

By continuing to use this website you are giving consent to cookies being used in accordance with the MarkLogic Privacy Statement.